Download presentation
Presentation is loading. Please wait.
Published byJohnathan Stokes Modified over 9 years ago
1
METADATA: TRACKING AND ENCRYPTION
2
METADATA EXAMPLES Microsoft Word document properties Telephone/email metadata Camera/image metadata Web browser identification and tracking
3
MICROSOFT WORD – DOCUMENT INSPECTOR
4
TELEPHONE & EMAIL Similar to postal mail: Information needed to route and deliver the message In many cases, content is less valuable than metadata
5
CAMERA / IMAGE METADATA EXIF Date & time Camera settings (e.g. aperture, shutter speed, ISO speed) GPS location
6
WEBPAGE METADATA Evercookie Panopticlick Do Not Track HTTP Header
7
SOCIAL NETWORKING METADATA Sleeping Time Please Rob Me
8
INTERLUDE – SHOPPING METADATA
9
METADATA PRIVACY LAWS Video Privacy Protection Act (VPPA) Driver's Privacy Protection Act of 1994 (DPPA)
10
ENCRYPTION Doesn’t apply to metadata that is needed for routing (in most cases)
11
TOR – THE ONION ROUTER Origin node randomly selects three network nodes Data is wrapped in three layers of encryption
12
TOR - WEAKNESSES Tracking cookies Exit node eavesdropping Traffic (timing) analysis Site operators may block Tor traffic Heartbleed
13
HEARTBLEED Exploits a flaw in TLS “heartbeat” extension Affects servers and clients Heartbeat message consists of a payload and a buffer Attack consists of sending a maliciously constructed heartbeat message
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.